ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Analysis of Speech Cryptography Based on Segmentation and Chaotic Logistic Map Keys

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.11, No. 12)

Publication Date:

Authors : ; ;

Page : 1-21

Keywords : Cryptography; PK; CK; CTMM; CLMM; MSE; PSNR; CC; NSCR; TP;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Securing transmitted speech file is a vital issue, in this paper research a new method of speech cryptography will be introduced, this method will be simple and easy to use, it can be used to encrypt-decrypt stereo and mono speeches with any size. The proposed method will use a complicated mixed chaotic key, this private key will hold a secret information, including the chaotic parameters required to run CTMM and CLMM to generate Chaotic keys, the PK will provide a huge key space making the hacking attempt impossible, the generated chaotic keys will sensitive to any minor changes in the chaotic parameters values, any minor changes in the decryption phase will produce a corrupted damaged decrypted file, and these changes will be considered as a hacking attempt. It will be proved how the proposed method will satisfy the quality requirements in the encryption and decryption phases, many measured will be introduced such as MSE, PSNR, CC and NSCR. The proposed method will be implemented and the obtained results will be analyzed using various types of data analysis to prove the performance issues of the proposed method.

Last modified: 2022-12-11 20:58:59